2017-01-21 07:21:05 -05:00
|
|
|
# frozen_string_literal: true
|
1999-08-13 01:45:20 -04:00
|
|
|
#
|
2002-12-19 15:00:19 -05:00
|
|
|
# tempfile - manipulates temporary files
|
1999-08-13 01:45:20 -04:00
|
|
|
#
|
2002-12-19 15:00:19 -05:00
|
|
|
# $Id$
|
2002-11-18 02:26:44 -05:00
|
|
|
#
|
1999-08-13 01:45:20 -04:00
|
|
|
|
|
|
|
require 'delegate'
|
2003-07-21 11:34:18 -04:00
|
|
|
require 'tmpdir'
|
1999-08-13 01:45:20 -04:00
|
|
|
|
2009-08-26 08:50:57 -04:00
|
|
|
# A utility class for managing temporary files. When you create a Tempfile
|
|
|
|
# object, it will create a temporary file with a unique filename. A Tempfile
|
|
|
|
# objects behaves just like a File object, and you can perform all the usual
|
|
|
|
# file operations on it: reading data, writing data, changing its permissions,
|
|
|
|
# etc. So although this class does not explicitly document all instance methods
|
|
|
|
# supported by File, you can in fact call any File instance method on a
|
|
|
|
# Tempfile object.
|
|
|
|
#
|
|
|
|
# == Synopsis
|
|
|
|
#
|
|
|
|
# require 'tempfile'
|
2009-08-26 09:36:28 -04:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# file = Tempfile.new('foo')
|
|
|
|
# file.path # => A unique filename in the OS's temp directory,
|
|
|
|
# # e.g.: "/tmp/foo.24722.0"
|
|
|
|
# # This filename contains 'foo' in its basename.
|
|
|
|
# file.write("hello world")
|
|
|
|
# file.rewind
|
|
|
|
# file.read # => "hello world"
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
#
|
|
|
|
# == Good practices
|
|
|
|
#
|
|
|
|
# === Explicit close
|
|
|
|
#
|
|
|
|
# When a Tempfile object is garbage collected, or when the Ruby interpreter
|
|
|
|
# exits, its associated temporary file is automatically deleted. This means
|
|
|
|
# that's it's unnecessary to explicitly delete a Tempfile after use, though
|
|
|
|
# it's good practice to do so: not explicitly deleting unused Tempfiles can
|
|
|
|
# potentially leave behind large amounts of tempfiles on the filesystem
|
2011-08-26 18:22:37 -04:00
|
|
|
# until they're garbage collected. The existence of these temp files can make
|
2009-08-26 08:50:57 -04:00
|
|
|
# it harder to determine a new Tempfile filename.
|
|
|
|
#
|
|
|
|
# Therefore, one should always call #unlink or close in an ensure block, like
|
|
|
|
# this:
|
|
|
|
#
|
2009-08-26 09:36:28 -04:00
|
|
|
# file = Tempfile.new('foo')
|
2009-08-26 08:50:57 -04:00
|
|
|
# begin
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ...do something with file...
|
2009-08-26 08:50:57 -04:00
|
|
|
# ensure
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# === Unlink after creation
|
|
|
|
#
|
|
|
|
# On POSIX systems, it's possible to unlink a file right after creating it,
|
|
|
|
# and before closing it. This removes the filesystem entry without closing
|
|
|
|
# the file handle, so it ensures that only the processes that already had
|
|
|
|
# the file handle open can access the file's contents. It's strongly
|
|
|
|
# recommended that you do this if you do not want any other processes to
|
|
|
|
# be able to read from or write to the Tempfile, and you do not need to
|
|
|
|
# know the Tempfile's filename either.
|
|
|
|
#
|
|
|
|
# For example, a practical use case for unlink-after-creation would be this:
|
|
|
|
# you need a large byte buffer that's too large to comfortably fit in RAM,
|
|
|
|
# e.g. when you're writing a web server and you want to buffer the client's
|
|
|
|
# file upload data.
|
|
|
|
#
|
|
|
|
# Please refer to #unlink for more information and a code example.
|
|
|
|
#
|
|
|
|
# == Minor notes
|
|
|
|
#
|
|
|
|
# Tempfile's filename picking method is both thread-safe and inter-process-safe:
|
|
|
|
# it guarantees that no other threads or processes will pick the same filename.
|
|
|
|
#
|
|
|
|
# Tempfile itself however may not be entirely thread-safe. If you access the
|
|
|
|
# same Tempfile object from multiple threads then you should protect it with a
|
|
|
|
# mutex.
|
2004-03-29 02:54:38 -05:00
|
|
|
class Tempfile < DelegateClass(File)
|
2009-08-26 08:50:57 -04:00
|
|
|
# Creates a temporary file with permissions 0600 (= only readable and
|
|
|
|
# writable by the owner) and opens it with mode "w+".
|
2002-12-19 15:00:19 -05:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# The +basename+ parameter is used to determine the name of the
|
|
|
|
# temporary file. You can either pass a String or an Array with
|
|
|
|
# 2 String elements. In the former form, the temporary file's base
|
|
|
|
# name will begin with the given string. In the latter form,
|
|
|
|
# the temporary file's base name will begin with the array's first
|
|
|
|
# element, and end with the second element. For example:
|
|
|
|
#
|
|
|
|
# file = Tempfile.new('hello')
|
2011-03-07 03:44:45 -05:00
|
|
|
# file.path # => something like: "/tmp/hello2843-8392-92849382--0"
|
2009-08-26 09:36:28 -04:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# # Use the Array form to enforce an extension in the filename:
|
|
|
|
# file = Tempfile.new(['hello', '.jpg'])
|
2011-03-07 03:44:45 -05:00
|
|
|
# file.path # => something like: "/tmp/hello2843-8392-92849382--0.jpg"
|
2009-08-26 08:50:57 -04:00
|
|
|
#
|
|
|
|
# The temporary file will be placed in the directory as specified
|
|
|
|
# by the +tmpdir+ parameter. By default, this is +Dir.tmpdir+.
|
|
|
|
# When $SAFE > 0 and the given +tmpdir+ is tainted, it uses
|
|
|
|
# '/tmp' as the temporary directory. Please note that ENV values
|
|
|
|
# are tainted by default, and +Dir.tmpdir+'s return value might
|
|
|
|
# come from environment variables (e.g. <tt>$TMPDIR</tt>).
|
|
|
|
#
|
|
|
|
# file = Tempfile.new('hello', '/home/aisaka')
|
2011-03-07 03:44:45 -05:00
|
|
|
# file.path # => something like: "/home/aisaka/hello2843-8392-92849382--0"
|
2009-08-26 08:50:57 -04:00
|
|
|
#
|
|
|
|
# You can also pass an options hash. Under the hood, Tempfile creates
|
|
|
|
# the temporary file using +File.open+. These options will be passed to
|
|
|
|
# +File.open+. This is mostly useful for specifying encoding
|
|
|
|
# options, e.g.:
|
|
|
|
#
|
2018-12-16 07:09:08 -05:00
|
|
|
# Tempfile.new('hello', '/home/aisaka', encoding: 'ascii-8bit')
|
2009-08-26 09:36:28 -04:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# # You can also omit the 'tmpdir' parameter:
|
2018-12-16 07:09:08 -05:00
|
|
|
# Tempfile.new('hello', encoding: 'ascii-8bit')
|
|
|
|
#
|
|
|
|
# Note: +mode+ keyword argument, as accepted by Tempfile, can only be
|
|
|
|
# numeric, combination of the modes defined in File::Constants.
|
2009-08-26 08:50:57 -04:00
|
|
|
#
|
|
|
|
# === Exceptions
|
2009-08-26 09:36:28 -04:00
|
|
|
#
|
2009-08-28 14:11:37 -04:00
|
|
|
# If Tempfile.new cannot find a unique filename within a limited
|
|
|
|
# number of tries, then it will raise an exception.
|
2015-01-03 19:18:38 -05:00
|
|
|
def initialize(basename="", tmpdir=nil, mode: 0, **options)
|
2017-12-12 06:56:25 -05:00
|
|
|
warn "Tempfile.new doesn't call the given block.", uplevel: 1 if block_given?
|
2002-11-17 13:01:17 -05:00
|
|
|
|
2015-05-30 03:01:29 -04:00
|
|
|
@unlinked = false
|
2015-05-29 21:29:48 -04:00
|
|
|
@mode = mode|File::RDWR|File::CREAT|File::EXCL
|
2019-04-07 19:44:49 -04:00
|
|
|
::Dir::Tmpname.create(basename, tmpdir, **options) do |tmpname, n, opts|
|
2014-09-20 13:35:06 -04:00
|
|
|
opts[:perm] = 0600
|
Make rb_scan_args handle keywords more similar to Ruby methods (#2460)
Cfuncs that use rb_scan_args with the : entry suffer similar keyword
argument separation issues that Ruby methods suffer if the cfuncs
accept optional or variable arguments.
This makes the following changes to : handling.
* Treats as **kw, prompting keyword argument separation warnings
if called with a positional hash.
* Do not look for an option hash if empty keywords are provided.
For backwards compatibility, treat an empty keyword splat as a empty
mandatory positional hash argument, but emit a a warning, as this
behavior will be removed in Ruby 3. The argument number check
needs to be moved lower so it can correctly handle an empty
positional argument being added.
* If the last argument is nil and it is necessary to treat it as an option
hash in order to make sure all arguments are processed, continue to
treat the last argument as the option hash. Emit a warning in this case,
as this behavior will be removed in Ruby 3.
* If splitting the keyword hash into two hashes, issue a warning, as we
will not be splitting hashes in Ruby 3.
* If the keyword argument is required to fill a mandatory positional
argument, continue to do so, but emit a warning as this behavior will
be going away in Ruby 3.
* If keyword arguments are provided and the last argument is not a hash,
that indicates something wrong. This can happen if a cfunc is calling
rb_scan_args multiple times, and providing arguments that were not
passed to it from Ruby. Callers need to switch to the new
rb_scan_args_kw function, which allows passing of whether keywords
were provided.
This commit fixes all warnings caused by the changes above.
It switches some function calls to *_kw versions with appropriate
kw_splat flags. If delegating arguments, RB_PASS_CALLED_KEYWORDS
is used. If creating new arguments, RB_PASS_KEYWORDS is used if
the last argument is a hash to be treated as keywords.
In open_key_args in io.c, use rb_scan_args_kw.
In this case, the arguments provided come from another C
function, not Ruby. The last argument may or may not be a hash,
so we can't set keyword argument mode. However, if it is a
hash, we don't want to warn when treating it as keywords.
In Ruby files, make sure to appropriately use keyword splats
or literal keywords when calling Cfuncs that now issue keyword
argument separation warnings through rb_scan_args. Also, make
sure not to pass nil in place of an option hash.
Work around Kernel#warn warnings due to problems in the Rubygems
override of the method. There is an open pull request to fix
these issues in Rubygems, but part of the Rubygems tests for
their override fail on ruby-head due to rb_scan_args not
recognizing empty keyword splats, which this commit fixes.
Implementation wise, adding rb_scan_args_kw is kind of a pain,
because rb_scan_args takes a variable number of arguments.
In order to not duplicate all the code, the function internals need
to be split into two functions taking a va_list, and to avoid passing
in a ton of arguments, a single struct argument is used to handle
the variables previously local to the function.
2019-09-25 14:18:49 -04:00
|
|
|
@tmpfile = File.open(tmpname, @mode, **opts)
|
2015-05-29 21:29:48 -04:00
|
|
|
@opts = opts.freeze
|
2008-10-18 06:32:26 -04:00
|
|
|
end
|
2015-05-29 21:29:48 -04:00
|
|
|
ObjectSpace.define_finalizer(self, Remover.new(@tmpfile))
|
2002-11-17 13:01:17 -05:00
|
|
|
|
2001-05-06 11:06:00 -04:00
|
|
|
super(@tmpfile)
|
1999-08-13 01:45:20 -04:00
|
|
|
end
|
|
|
|
|
2002-12-19 15:00:19 -05:00
|
|
|
# Opens or reopens the file with mode "r+".
|
1999-08-13 01:45:20 -04:00
|
|
|
def open
|
2015-05-29 21:29:48 -04:00
|
|
|
_close
|
|
|
|
mode = @mode & ~(File::CREAT|File::EXCL)
|
Make rb_scan_args handle keywords more similar to Ruby methods (#2460)
Cfuncs that use rb_scan_args with the : entry suffer similar keyword
argument separation issues that Ruby methods suffer if the cfuncs
accept optional or variable arguments.
This makes the following changes to : handling.
* Treats as **kw, prompting keyword argument separation warnings
if called with a positional hash.
* Do not look for an option hash if empty keywords are provided.
For backwards compatibility, treat an empty keyword splat as a empty
mandatory positional hash argument, but emit a a warning, as this
behavior will be removed in Ruby 3. The argument number check
needs to be moved lower so it can correctly handle an empty
positional argument being added.
* If the last argument is nil and it is necessary to treat it as an option
hash in order to make sure all arguments are processed, continue to
treat the last argument as the option hash. Emit a warning in this case,
as this behavior will be removed in Ruby 3.
* If splitting the keyword hash into two hashes, issue a warning, as we
will not be splitting hashes in Ruby 3.
* If the keyword argument is required to fill a mandatory positional
argument, continue to do so, but emit a warning as this behavior will
be going away in Ruby 3.
* If keyword arguments are provided and the last argument is not a hash,
that indicates something wrong. This can happen if a cfunc is calling
rb_scan_args multiple times, and providing arguments that were not
passed to it from Ruby. Callers need to switch to the new
rb_scan_args_kw function, which allows passing of whether keywords
were provided.
This commit fixes all warnings caused by the changes above.
It switches some function calls to *_kw versions with appropriate
kw_splat flags. If delegating arguments, RB_PASS_CALLED_KEYWORDS
is used. If creating new arguments, RB_PASS_KEYWORDS is used if
the last argument is a hash to be treated as keywords.
In open_key_args in io.c, use rb_scan_args_kw.
In this case, the arguments provided come from another C
function, not Ruby. The last argument may or may not be a hash,
so we can't set keyword argument mode. However, if it is a
hash, we don't want to warn when treating it as keywords.
In Ruby files, make sure to appropriately use keyword splats
or literal keywords when calling Cfuncs that now issue keyword
argument separation warnings through rb_scan_args. Also, make
sure not to pass nil in place of an option hash.
Work around Kernel#warn warnings due to problems in the Rubygems
override of the method. There is an open pull request to fix
these issues in Rubygems, but part of the Rubygems tests for
their override fail on ruby-head due to rb_scan_args not
recognizing empty keyword splats, which this commit fixes.
Implementation wise, adding rb_scan_args_kw is kind of a pain,
because rb_scan_args takes a variable number of arguments.
In order to not duplicate all the code, the function internals need
to be split into two functions taking a va_list, and to avoid passing
in a ton of arguments, a single struct argument is used to handle
the variables previously local to the function.
2019-09-25 14:18:49 -04:00
|
|
|
@tmpfile = File.open(@tmpfile.path, mode, **@opts)
|
1999-08-13 01:45:20 -04:00
|
|
|
__setobj__(@tmpfile)
|
|
|
|
end
|
|
|
|
|
2011-05-18 20:07:25 -04:00
|
|
|
def _close # :nodoc:
|
2016-11-21 18:05:41 -05:00
|
|
|
@tmpfile.close
|
2004-03-23 14:14:16 -05:00
|
|
|
end
|
2002-12-19 14:01:59 -05:00
|
|
|
protected :_close
|
|
|
|
|
2009-08-26 08:50:57 -04:00
|
|
|
# Closes the file. If +unlink_now+ is true, then the file will be unlinked
|
|
|
|
# (deleted) after closing. Of course, you can choose to later call #unlink
|
|
|
|
# if you do not unlink it now.
|
2002-12-19 15:00:19 -05:00
|
|
|
#
|
|
|
|
# If you don't explicitly unlink the temporary file, the removal
|
|
|
|
# will be delayed until the object is finalized.
|
2002-12-23 09:48:14 -05:00
|
|
|
def close(unlink_now=false)
|
2015-05-29 21:29:48 -04:00
|
|
|
_close
|
|
|
|
unlink if unlink_now
|
1999-08-13 01:45:20 -04:00
|
|
|
end
|
|
|
|
|
2009-08-26 08:50:57 -04:00
|
|
|
# Closes and unlinks (deletes) the file. Has the same effect as called
|
|
|
|
# <tt>close(true)</tt>.
|
2002-12-19 14:01:59 -05:00
|
|
|
def close!
|
2015-05-29 21:29:48 -04:00
|
|
|
close(true)
|
2002-12-19 14:01:59 -05:00
|
|
|
end
|
|
|
|
|
2009-08-26 08:50:57 -04:00
|
|
|
# Unlinks (deletes) the file from the filesystem. One should always unlink
|
|
|
|
# the file after using it, as is explained in the "Explicit close" good
|
|
|
|
# practice section in the Tempfile overview:
|
|
|
|
#
|
2009-08-26 09:36:28 -04:00
|
|
|
# file = Tempfile.new('foo')
|
2009-08-26 08:50:57 -04:00
|
|
|
# begin
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ...do something with file...
|
2009-08-26 08:50:57 -04:00
|
|
|
# ensure
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# === Unlink-before-close
|
|
|
|
#
|
|
|
|
# On POSIX systems it's possible to unlink a file before closing it. This
|
|
|
|
# practice is explained in detail in the Tempfile overview (section
|
|
|
|
# "Unlink after creation"); please refer there for more information.
|
|
|
|
#
|
|
|
|
# However, unlink-before-close may not be supported on non-POSIX operating
|
|
|
|
# systems. Microsoft Windows is the most notable case: unlinking a non-closed
|
|
|
|
# file will result in an error, which this method will silently ignore. If
|
|
|
|
# you want to practice unlink-before-close whenever possible, then you should
|
|
|
|
# write code like this:
|
|
|
|
#
|
|
|
|
# file = Tempfile.new('foo')
|
|
|
|
# file.unlink # On Windows this silently fails.
|
|
|
|
# begin
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ... do something with file ...
|
2009-08-26 08:50:57 -04:00
|
|
|
# ensure
|
|
|
|
# file.close! # Closes the file handle. If the file wasn't unlinked
|
|
|
|
# # because #unlink failed, then this method will attempt
|
|
|
|
# # to do so again.
|
|
|
|
# end
|
2002-12-19 14:01:59 -05:00
|
|
|
def unlink
|
2015-05-29 21:29:48 -04:00
|
|
|
return if @unlinked
|
2004-05-07 04:44:24 -04:00
|
|
|
begin
|
2015-05-29 21:29:48 -04:00
|
|
|
File.unlink(@tmpfile.path)
|
2012-02-01 11:12:44 -05:00
|
|
|
rescue Errno::ENOENT
|
2005-05-10 21:46:31 -04:00
|
|
|
rescue Errno::EACCES
|
2004-05-07 04:44:24 -04:00
|
|
|
# may not be able to unlink on Windows; just ignore
|
2012-02-01 11:12:44 -05:00
|
|
|
return
|
2004-05-07 04:44:24 -04:00
|
|
|
end
|
2013-10-01 09:03:58 -04:00
|
|
|
ObjectSpace.undefine_finalizer(self)
|
2015-05-29 21:29:48 -04:00
|
|
|
@unlinked = true
|
2002-12-19 14:01:59 -05:00
|
|
|
end
|
|
|
|
alias delete unlink
|
|
|
|
|
2002-12-19 15:00:19 -05:00
|
|
|
# Returns the full path name of the temporary file.
|
2009-08-26 01:34:47 -04:00
|
|
|
# This will be nil if #unlink has been called.
|
1999-08-13 01:45:20 -04:00
|
|
|
def path
|
2015-05-29 21:29:48 -04:00
|
|
|
@unlinked ? nil : @tmpfile.path
|
1999-08-13 01:45:20 -04:00
|
|
|
end
|
2002-06-04 03:34:19 -04:00
|
|
|
|
2002-12-19 15:00:19 -05:00
|
|
|
# Returns the size of the temporary file. As a side effect, the IO
|
|
|
|
# buffer is flushed before determining the size.
|
2002-06-04 03:34:19 -04:00
|
|
|
def size
|
2015-05-29 21:29:48 -04:00
|
|
|
if !@tmpfile.closed?
|
|
|
|
@tmpfile.size # File#size calls rb_io_flush_raw()
|
2002-06-04 03:34:19 -04:00
|
|
|
else
|
2017-03-14 08:53:32 -04:00
|
|
|
File.size(@tmpfile.path)
|
2002-06-04 03:34:19 -04:00
|
|
|
end
|
|
|
|
end
|
2002-12-19 15:00:19 -05:00
|
|
|
alias length size
|
|
|
|
|
2013-05-19 19:03:25 -04:00
|
|
|
# :stopdoc:
|
2012-11-06 03:06:21 -05:00
|
|
|
def inspect
|
2019-07-03 06:25:05 -04:00
|
|
|
if @tmpfile.closed?
|
2014-05-27 12:03:35 -04:00
|
|
|
"#<#{self.class}:#{path} (closed)>"
|
|
|
|
else
|
|
|
|
"#<#{self.class}:#{path}>"
|
|
|
|
end
|
2012-11-06 03:06:21 -05:00
|
|
|
end
|
|
|
|
|
2018-12-13 22:36:13 -05:00
|
|
|
class Remover # :nodoc:
|
2015-05-29 21:29:48 -04:00
|
|
|
def initialize(tmpfile)
|
|
|
|
@pid = Process.pid
|
|
|
|
@tmpfile = tmpfile
|
2010-02-12 22:20:52 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def call(*args)
|
2015-05-29 21:29:48 -04:00
|
|
|
return if @pid != Process.pid
|
2002-12-19 15:00:19 -05:00
|
|
|
|
2017-12-12 06:56:25 -05:00
|
|
|
$stderr.puts "removing #{@tmpfile.path}..." if $DEBUG
|
2002-12-19 15:00:19 -05:00
|
|
|
|
2016-11-21 18:05:41 -05:00
|
|
|
@tmpfile.close
|
2015-05-29 21:29:48 -04:00
|
|
|
begin
|
|
|
|
File.unlink(@tmpfile.path)
|
|
|
|
rescue Errno::ENOENT
|
2010-02-12 22:20:52 -05:00
|
|
|
end
|
2012-02-01 11:12:44 -05:00
|
|
|
|
2017-12-12 06:56:25 -05:00
|
|
|
$stderr.puts "done" if $DEBUG
|
2002-12-19 15:00:19 -05:00
|
|
|
end
|
2010-02-12 22:20:52 -05:00
|
|
|
end
|
2002-12-19 15:00:19 -05:00
|
|
|
|
2010-02-12 22:20:52 -05:00
|
|
|
class << self
|
2014-08-10 22:26:36 -04:00
|
|
|
# :startdoc:
|
|
|
|
|
2009-08-26 08:50:57 -04:00
|
|
|
# Creates a new Tempfile.
|
|
|
|
#
|
|
|
|
# If no block is given, this is a synonym for Tempfile.new.
|
|
|
|
#
|
|
|
|
# If a block is given, then a Tempfile object will be constructed,
|
|
|
|
# and the block is run with said object as argument. The Tempfile
|
2011-12-04 08:50:58 -05:00
|
|
|
# object will be automatically closed after the block terminates.
|
2009-08-26 08:50:57 -04:00
|
|
|
# The call returns the value of the block.
|
|
|
|
#
|
2017-10-16 19:11:40 -04:00
|
|
|
# In any case, all arguments (<code>*args</code>) will be passed to Tempfile.new.
|
2003-01-20 07:27:53 -05:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# Tempfile.open('foo', '/home/temp') do |f|
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ... do something with f ...
|
2009-08-26 08:50:57 -04:00
|
|
|
# end
|
2009-08-26 09:36:28 -04:00
|
|
|
#
|
2009-08-26 08:50:57 -04:00
|
|
|
# # Equivalent:
|
|
|
|
# f = Tempfile.open('foo', '/home/temp')
|
|
|
|
# begin
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ... do something with f ...
|
2009-08-26 08:50:57 -04:00
|
|
|
# ensure
|
|
|
|
# f.close
|
|
|
|
# end
|
2019-09-06 16:37:09 -04:00
|
|
|
def open(*args, **kw)
|
|
|
|
tempfile = new(*args, **kw)
|
2003-01-20 07:27:53 -05:00
|
|
|
|
|
|
|
if block_given?
|
2011-05-18 17:19:18 -04:00
|
|
|
begin
|
|
|
|
yield(tempfile)
|
|
|
|
ensure
|
|
|
|
tempfile.close
|
|
|
|
end
|
2003-01-20 07:27:53 -05:00
|
|
|
else
|
2011-05-18 17:19:18 -04:00
|
|
|
tempfile
|
2003-01-20 07:27:53 -05:00
|
|
|
end
|
2002-12-19 15:00:19 -05:00
|
|
|
end
|
|
|
|
end
|
1999-08-13 01:45:20 -04:00
|
|
|
end
|
|
|
|
|
2015-06-12 22:40:38 -04:00
|
|
|
# Creates a temporary file as usual File object (not Tempfile).
|
|
|
|
# It doesn't use finalizer and delegation.
|
2013-04-20 09:50:47 -04:00
|
|
|
#
|
|
|
|
# If no block is given, this is similar to Tempfile.new except
|
|
|
|
# creating File instead of Tempfile.
|
|
|
|
# The created file is not removed automatically.
|
|
|
|
# You should use File.unlink to remove it.
|
|
|
|
#
|
|
|
|
# If a block is given, then a File object will be constructed,
|
|
|
|
# and the block is invoked with the object as the argument.
|
|
|
|
# The File object will be automatically closed and
|
2015-06-12 22:40:38 -04:00
|
|
|
# the temporary file is removed after the block terminates.
|
2013-04-20 09:50:47 -04:00
|
|
|
# The call returns the value of the block.
|
|
|
|
#
|
2017-10-17 08:40:00 -04:00
|
|
|
# In any case, all arguments (+basename+, +tmpdir+, +mode+, and
|
|
|
|
# <code>**options</code>) will be treated as Tempfile.new.
|
2013-04-20 09:50:47 -04:00
|
|
|
#
|
|
|
|
# Tempfile.create('foo', '/home/temp') do |f|
|
2018-12-16 07:09:08 -05:00
|
|
|
# # ... do something with f ...
|
2013-04-20 09:50:47 -04:00
|
|
|
# end
|
|
|
|
#
|
2016-09-26 01:45:29 -04:00
|
|
|
def Tempfile.create(basename="", tmpdir=nil, mode: 0, **options)
|
2013-04-20 09:50:47 -04:00
|
|
|
tmpfile = nil
|
2019-04-07 19:44:49 -04:00
|
|
|
Dir::Tmpname.create(basename, tmpdir, **options) do |tmpname, n, opts|
|
2014-09-20 13:35:06 -04:00
|
|
|
mode |= File::RDWR|File::CREAT|File::EXCL
|
|
|
|
opts[:perm] = 0600
|
Make rb_scan_args handle keywords more similar to Ruby methods (#2460)
Cfuncs that use rb_scan_args with the : entry suffer similar keyword
argument separation issues that Ruby methods suffer if the cfuncs
accept optional or variable arguments.
This makes the following changes to : handling.
* Treats as **kw, prompting keyword argument separation warnings
if called with a positional hash.
* Do not look for an option hash if empty keywords are provided.
For backwards compatibility, treat an empty keyword splat as a empty
mandatory positional hash argument, but emit a a warning, as this
behavior will be removed in Ruby 3. The argument number check
needs to be moved lower so it can correctly handle an empty
positional argument being added.
* If the last argument is nil and it is necessary to treat it as an option
hash in order to make sure all arguments are processed, continue to
treat the last argument as the option hash. Emit a warning in this case,
as this behavior will be removed in Ruby 3.
* If splitting the keyword hash into two hashes, issue a warning, as we
will not be splitting hashes in Ruby 3.
* If the keyword argument is required to fill a mandatory positional
argument, continue to do so, but emit a warning as this behavior will
be going away in Ruby 3.
* If keyword arguments are provided and the last argument is not a hash,
that indicates something wrong. This can happen if a cfunc is calling
rb_scan_args multiple times, and providing arguments that were not
passed to it from Ruby. Callers need to switch to the new
rb_scan_args_kw function, which allows passing of whether keywords
were provided.
This commit fixes all warnings caused by the changes above.
It switches some function calls to *_kw versions with appropriate
kw_splat flags. If delegating arguments, RB_PASS_CALLED_KEYWORDS
is used. If creating new arguments, RB_PASS_KEYWORDS is used if
the last argument is a hash to be treated as keywords.
In open_key_args in io.c, use rb_scan_args_kw.
In this case, the arguments provided come from another C
function, not Ruby. The last argument may or may not be a hash,
so we can't set keyword argument mode. However, if it is a
hash, we don't want to warn when treating it as keywords.
In Ruby files, make sure to appropriately use keyword splats
or literal keywords when calling Cfuncs that now issue keyword
argument separation warnings through rb_scan_args. Also, make
sure not to pass nil in place of an option hash.
Work around Kernel#warn warnings due to problems in the Rubygems
override of the method. There is an open pull request to fix
these issues in Rubygems, but part of the Rubygems tests for
their override fail on ruby-head due to rb_scan_args not
recognizing empty keyword splats, which this commit fixes.
Implementation wise, adding rb_scan_args_kw is kind of a pain,
because rb_scan_args takes a variable number of arguments.
In order to not duplicate all the code, the function internals need
to be split into two functions taking a va_list, and to avoid passing
in a ton of arguments, a single struct argument is used to handle
the variables previously local to the function.
2019-09-25 14:18:49 -04:00
|
|
|
tmpfile = File.open(tmpname, mode, **opts)
|
2013-04-20 09:50:47 -04:00
|
|
|
end
|
|
|
|
if block_given?
|
|
|
|
begin
|
|
|
|
yield tmpfile
|
|
|
|
ensure
|
2017-05-19 05:36:34 -04:00
|
|
|
unless tmpfile.closed?
|
|
|
|
if File.identical?(tmpfile, tmpfile.path)
|
|
|
|
unlinked = File.unlink tmpfile.path rescue nil
|
|
|
|
end
|
|
|
|
tmpfile.close
|
2017-05-19 05:20:14 -04:00
|
|
|
end
|
|
|
|
unless unlinked
|
|
|
|
begin
|
|
|
|
File.unlink tmpfile.path
|
|
|
|
rescue Errno::ENOENT
|
|
|
|
end
|
|
|
|
end
|
2013-04-20 09:50:47 -04:00
|
|
|
end
|
|
|
|
else
|
|
|
|
tmpfile
|
|
|
|
end
|
|
|
|
end
|